Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 01:39

General

  • Target

    23149475a606c307ddfbd83ec62eae50.exe

  • Size

    1.0MB

  • MD5

    23149475a606c307ddfbd83ec62eae50

  • SHA1

    7b26528730414618ecdcce58f3f5ba16d604e13b

  • SHA256

    055eeb231a8d164638fb06673045514b018f738753e48f57f8ed48cac34f7af7

  • SHA512

    21ddb20d0177918248a95bf20fd2438a7ab67925c04ee8f4fc272a1a392df6ca481790457dd5f1698c636cb39299ea50986037e6dc8c79798871ce492b586ed2

  • SSDEEP

    24576:HbSaE4mvt/+/EWIw4ri+BQNnMabVAF318gp:HbSv4mvEDOgsPp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • NSIS installer 6 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23149475a606c307ddfbd83ec62eae50.exe
    "C:\Users\Admin\AppData\Local\Temp\23149475a606c307ddfbd83ec62eae50.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Users\Admin\AppData\Local\Temp\File.exe
      "C:\Users\Admin\AppData\Local\Temp\File.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:604
  • C:\Windows\SysWOW64\Wbem\wmic.exe
    wmic /output:C:\Users\Admin\AppData\Local\Temp\81704421299.txt bios get serialnumber
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:824
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 368
    1⤵
    • Loads dropped DLL
    • Program crash
    PID:844
  • C:\Windows\SysWOW64\Wbem\wmic.exe
    wmic /output:C:\Users\Admin\AppData\Local\Temp\81704421299.txt bios get version
    1⤵
      PID:2400
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic /output:C:\Users\Admin\AppData\Local\Temp\81704421299.txt bios get version
      1⤵
        PID:1824
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81704421299.txt bios get version
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1212
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81704421299.txt bios get version
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2380
      • C:\Users\Admin\AppData\Local\Temp\eicabfbcibhi.exe
        C:\Users\Admin\AppData\Local\Temp\eicabfbcibhi.exe 9-5-2-9-3-5-1-5-3-4-9 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
        1⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1744

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\File.exe

        Filesize

        557KB

        MD5

        462c994d39de40e45b378fb54993852c

        SHA1

        a5985d3c7cd7a4acf42e83b8383b752c490752fd

        SHA256

        fbcc5ccaca3572d79d593d38fada5d75245b5226c5662b2220f599e33e71e4c5

        SHA512

        2c023d50f0b6eae0a7017b4fbe1733f7042e9b40fb6570a3c8330911bbc15db97a8312beb3d9e5c235fa0889189d6030c5828640c45221830c638472eac844c3

      • C:\Users\Admin\AppData\Local\Temp\File.exe

        Filesize

        482KB

        MD5

        ad59a194a0bc65594413a92b52645671

        SHA1

        156d637891779aca3bf61982fbf32b1a3177a404

        SHA256

        435223e0dae985b44a7261352140df132c471b863242df0540dcc28cc9b7b450

        SHA512

        62712dc23390d91077269694341bc0bcba63123b1ae703828a13d240390b7d83c353f53244eaea91fa2b0b91c98030eff6ca03c35cb179b887d09ae19c5a72e3

      • C:\Users\Admin\AppData\Local\Temp\File.exe

        Filesize

        136KB

        MD5

        5c3cb7a3d323423d42b5f857cc97a256

        SHA1

        0ef1871d7153be41d2c23d1c3a6f23e80f90a8db

        SHA256

        347b21a75dbabb4c16479f95fa755160bb0220933b0b6594c5b0f6c57eb39d72

        SHA512

        deb97251699dcb270e935d715a48b0151cdec5cba3ca38c5588191524302bb5236ca4c39db1cbf57a11093223872cd63c20d679c7f7b179ac344a04b5d70a209

      • C:\Users\Admin\AppData\Local\Temp\nst88D0.tmp\dnjzh.dll

        Filesize

        99KB

        MD5

        b359b4cd84eadfe10082c99dc384c913

        SHA1

        e890a577148f49031fbbff9443dde34048252858

        SHA256

        3f75690293eab5b59d299f1ea3698889e9d8c898bdda0506124b804df3035a93

        SHA512

        d4919b0d70f62d555657fb053e6cdcd96be87fb85e96bad2ec81c4965f7596480d375b68c34ab6564db93d0e532c71a5a0906e4ea6589ae6f316b0b9dba12b77

      • \Users\Admin\AppData\Local\Temp\nst88D0.tmp\dnjzh.dll

        Filesize

        125KB

        MD5

        7d7518d98e68eebbb02ee06a931fd0c6

        SHA1

        73a1c22beb0381aa241a4542df29d20a9da5e033

        SHA256

        6fd1735c87fd55624f93a5141710324ba6c23788c8804ce387592a6599fe7f14

        SHA512

        bb33af0a4b0f21fb13112cdd6880575c5ff7b19b67ec6db74f7c558a7666f8aa34864650313a4e5f56afb239da0d7e1a6c9e6c1d789907aa2c31e930e7103117

      • \Users\Admin\AppData\Local\Temp\nst88D0.tmp\nsisunz.dll

        Filesize

        6KB

        MD5

        b519d78fde7eb1fa2f97a8b85fc995a2

        SHA1

        f1f54def99aa0186e7d3cba6b56a20f95f955845

        SHA256

        fe16e11f4c26b50b35f53b604fd25141ee39a9770e461a488bdadf1bb9beb757

        SHA512

        146ab0d020a24ab8b347fa45be0762205538c50223d81a5c872d1f4b2c559f4aca47fe3a3e4336dd38ccecf722d84a728a993506202343be6d6a9e60355b7ad2

      • memory/2948-1-0x0000000000B80000-0x0000000000C00000-memory.dmp

        Filesize

        512KB

      • memory/2948-0-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

        Filesize

        9.6MB

      • memory/2948-62-0x000000001AE10000-0x000000001AE88000-memory.dmp

        Filesize

        480KB

      • memory/2948-109-0x0000000000B80000-0x0000000000C00000-memory.dmp

        Filesize

        512KB

      • memory/2948-108-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

        Filesize

        9.6MB